Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems

    Siwan Noh1, Kyung-Hyune Rhee2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3805-3826, 2024, DOI:10.32604/cmc.2024.050949

    Abstract In Decentralized Machine Learning (DML) systems, system participants contribute their resources to assist others in developing machine learning solutions. Identifying malicious contributions in DML systems is challenging, which has led to the exploration of blockchain technology. Blockchain leverages its transparency and immutability to record the provenance and reliability of training data. However, storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs. Additionally, current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data. However, less… More >

  • Open Access

    ARTICLE

    Fine-Grained Ship Recognition Based on Visible and Near-Infrared Multimodal Remote Sensing Images: Dataset, Methodology and Evaluation

    Shiwen Song, Rui Zhang, Min Hu*, Feiyao Huang

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5243-5271, 2024, DOI:10.32604/cmc.2024.050879

    Abstract Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security. Currently, with the emergence of massive high-resolution multi-modality images, the use of multi-modality images for fine-grained recognition has become a promising technology. Fine-grained recognition of multi-modality images imposes higher requirements on the dataset samples. The key to the problem is how to extract and fuse the complementary features of multi-modality images to obtain more discriminative fusion features. The attention mechanism helps the model to pinpoint the key information in the image, resulting in a… More >

  • Open Access

    ARTICLE

    CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4319-4347, 2024, DOI:10.32604/cmc.2024.050586

    Abstract Intrusion detection systems (IDS) are essential in the field of cybersecurity because they protect networks from a wide range of online threats. The goal of this research is to meet the urgent need for small-footprint, highly-adaptable Network Intrusion Detection Systems (NIDS) that can identify anomalies. The NSL-KDD dataset is used in the study; it is a sizable collection comprising 43 variables with the label’s “attack” and “level.” It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks (CNN). Furthermore, this dataset makes it easier to conduct… More >

  • Open Access

    ARTICLE

    Research on Enhanced Contraband Dataset ACXray Based on ETL

    Xueping Song1,*, Jianming Yang1, Shuyu Zhang1, Jicun Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4551-4572, 2024, DOI:10.32604/cmc.2024.049446

    Abstract To address the shortage of public datasets for customs X-ray images of contraband and the difficulties in deploying trained models in engineering applications, a method has been proposed that employs the Extract-Transform-Load (ETL) approach to create an X-ray dataset of contraband items. Initially, X-ray scatter image data is collected and cleaned. Using Kafka message queues and the Elasticsearch (ES) distributed search engine, the data is transmitted in real-time to cloud servers. Subsequently, contraband data is annotated using a combination of neural networks and manual methods to improve annotation efficiency and implemented mean hash algorithm for… More >

  • Open Access

    ARTICLE

    Tuberculosis Diagnosis and Visualization with a Large Vietnamese X-Ray Image Dataset

    Nguyen Trong Vinh1, Lam Thanh Hien1, Ha Manh Toan2, Ngo Duc Vinh3, Do Nang Toan2,*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 281-299, 2024, DOI:10.32604/iasc.2024.045297

    Abstract Tuberculosis is a dangerous disease to human life, and we need a lot of attempts to stop and reverse it. Significantly, in the COVID-19 pandemic, access to medical services for tuberculosis has become very difficult. The late detection of tuberculosis could lead to danger to patient health, even death. Vietnam is one of the countries heavily affected by the COVID-19 pandemic, and many residential areas as well as hospitals have to be isolated for a long time. Reality demands a fast and effective tuberculosis diagnosis solution to deal with the difficulty of accessing medical services,… More >

  • Open Access

    ARTICLE

    Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections

    Dmitry Gura1,2, Bo Dong3,*, Duaa Mehiar4, Nidal Al Said5

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1995-2014, 2024, DOI:10.32604/cmc.2024.048238

    Abstract The motivation for this study is that the quality of deep fakes is constantly improving, which leads to the need to develop new methods for their detection. The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection, which is then used as input to the CNN. The customized Convolutional Neural Network method is the date augmented-based CNN model to generate ‘fake data’ or ‘fake images’. This study was carried out using Python and its libraries. We used 242 films from the dataset gathered by the Deep Fake… More >

  • Open Access

    ARTICLE

    KurdSet: A Kurdish Handwritten Characters Recognition Dataset Using Convolutional Neural Network

    Sardar Hasen Ali*, Maiwan Bahjat Abdulrazzaq

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 429-448, 2024, DOI:10.32604/cmc.2024.048356

    Abstract Handwritten character recognition (HCR) involves identifying characters in images, documents, and various sources such as forms surveys, questionnaires, and signatures, and transforming them into a machine-readable format for subsequent processing. Successfully recognizing complex and intricately shaped handwritten characters remains a significant obstacle. The use of convolutional neural network (CNN) in recent developments has notably advanced HCR, leveraging the ability to extract discriminative features from extensive sets of raw data. Because of the absence of pre-existing datasets in the Kurdish language, we created a Kurdish handwritten dataset called (KurdSet). The dataset consists of Kurdish characters, digits,… More >

  • Open Access

    ARTICLE

    Scheme Based on Multi-Level Patch Attention and Lesion Localization for Diabetic Retinopathy Grading

    Zhuoqun Xia1, Hangyu Hu1, Wenjing Li2,3, Qisheng Jiang1, Lan Pu1, Yicong Shu1, Arun Kumar Sangaiah4,5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 409-430, 2024, DOI:10.32604/cmes.2024.030052

    Abstract Early screening of diabetes retinopathy (DR) plays an important role in preventing irreversible blindness. Existing research has failed to fully explore effective DR lesion information in fundus maps. Besides, traditional attention schemes have not considered the impact of lesion type differences on grading, resulting in unreasonable extraction of important lesion features. Therefore, this paper proposes a DR diagnosis scheme that integrates a multi-level patch attention generator (MPAG) and a lesion localization module (LLM). Firstly, MPAG is used to predict patches of different sizes and generate a weighted attention map based on the prediction score and… More >

  • Open Access

    ARTICLE

    Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features

    Asifa Mehmood Qureshi1, Naif Al Mudawi2, Mohammed Alonazi3, Samia Allaoua Chelloug4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3683-3701, 2024, DOI:10.32604/cmc.2024.043611

    Abstract Road traffic monitoring is an imperative topic widely discussed among researchers. Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides. However, aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area. To this end, different models have shown the ability to recognize and track vehicles. However, these methods are not mature enough to produce accurate results in complex road scenes. Therefore, this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent… More >

Displaying 1-10 on page 1 of 140. Per Page